Abstract

Multisource cloud log forensics (MCLF) strengthens the investigation method by means of detecting the malicious behavior of hackers thru deep cloud log evaluation. But, the accessibility attributes of cloud logs thwarts accomplishing the purpose to analyze cloud logs. Accessibility consists of the productions of cloud log get admission to, selection of suitable cloud log file, cloud log information integrity, and cloud logs trustworthiness. Hence, forensic investigators of cloud log files are dependent on cloud provider vendors (CSPs) to get entry to of diverse cloud logs. Accessing cloud logs from outside the cloud without depending at the CSPs is once more a hard, whereas the boom in cloud assaults has improved the need for MCLF to research the malicious activities of attackers. Criminals are easily hiding incriminating files within the cloud system and altering the log contents. Hence lock mechanism has been added to MCLF technique. This paper reviews the MCLF with lock technique and highlights diverse challenges and issues involved in examining cloud log data. The logging mode, the importance of MCLF, and cloud multisource-log-as-a-service are introduced. The MCLF security necessities, weakness points, and experiments are recognized to tolerate altered cloud log susceptibilities. This paper represents the design and analysis details of MCLF with Lock technique.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call